top of page
Contribute to Intrusion8 Red Team Intelligence

Help build Threat Profiles and Threat Cases that strengthen Defensible 10 adoption through authorized education, simulation, and defensive planning.

Build the case. Pressure the standard.

1

Download Template

Get the Threat Case template and guidelines to begin your contribution.

3

Submit for Review

Submit your work for community peer review and feedback.

2

Develop Threat Case

Create your threat case following the established framework and schema.

4

Publication

Upon approval, your sub-standard becomes part of the official framework.

NOTEOptional - ISAU allows the author’s name to be presented as the original submitter for credit and transparency.

Become a Threat Profile & Case Author

ISAUnited invites qualified technical practitioners, architects, and engineers to participate in developing Intrusion Threat Cases—the detailed, domain-specific extensions of each Threat Profile within the Defensible 10 Standards (D10S).
By contributing, you help advance cybersecurity architecture and engineering into a structured, defensible discipline practiced globally.

Registration and Vetting

To maintain the technical rigor and integrity of ISAUnited’s open standards process, all prospective Threat Profile or Case authors must register for official vetting before receiving contributor access.
Registration ensures:

  • Verification of professional background and relevant expertise in IT, cloud, software, or cybersecurity engineering.

  • Assignment to appropriate review tracks within the ISAUnited Standards Committee or the Technical Fellow Society.

  • Access to the Intrusion Vault (TA CAT, TV CAT, TT CAT), the Defensible Standards Submission Schema (D-SSF), approved author templates for Threat Profiles and Threat Cases, and supporting technical reference resources.

Upon successful vetting, registered contributors gain full access to authoring tools, reference materials, and peer-review collaboration channels.

Click the Register button to apply.

Supported by:

I8_logo4.png

Training by:

new-1-blue-background_v2.png

Practitioner and Organizational Use

Intrusion 8 is for educational and instructional purposes only. Content is written to strengthen defensive readiness and professional practice. Intrusion 8 does not provide procedural guidance intended for misuse.

Commercial, Vendor, and Integration Use

The use, reproduction, or incorporation of the Intrusion Threat Profiles or their content within commercial products, software, tooling, managed services, or for-profit offerings requires a separate commercial integration or redistribution license issued by the Institute of Security Architecture United (ISAUnited.org).


This includes but is not limited to:

  • Integration into commercial or subscription-based platforms or software tools

  • Use in vendor-branded frameworks or automated compliance products

  • Redistribution of modified or adapted versions for resale or commercial benefit

 

Requests for commercial licensing or integration agreements should be directed to:  info@isaunited.org

© 2026 The Intrusion 8 Threat Profiles. Owned, operated, and maintained by the Institute of Security Architecture United (ISAUnited.org).

bottom of page